Cell encapsulation in liquified compartments: Protocol optimization and challenges

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

economic optimization and energy consumption in tray dryers

دراین پروژه به بررسی مدل سازی خشک کردن مواد غذایی با استفاده از هوای خشک در خشک کن آزمایشگاهی نوع سینی دار پرداخته شده است. برای آنالیز انتقال رطوبت در طی خشک شدن به طریق جابجایی، یک مدل لایه نازک برای انتقال رطوبت، مبتنی بر معادله نفوذ فیک در نظر گفته شده است که شامل انتقال همزمان جرم و انرژی بین فاز جامد و گاز می باشد. پروفایل دما و رطوبت برای سه نوع ماده غذایی شامل سیب زمینی، سیب و موز در طی...

15 صفحه اول

Experimental models of primitive cellular compartments: encapsulation, growth, and division.

The clay montmorillonite is known to catalyze the polymerization of RNA from activated ribonucleotides. Here we report that montmorillonite accelerates the spontaneous conversion of fatty acid micelles into vesicles. Clay particles often become encapsulated in these vesicles, thus providing a pathway for the prebiotic encapsulation of catalytically active surfaces within membrane vesicles. In a...

متن کامل

Security-Preserving Asymmetric Protocol Encapsulation

Query-response based protocols between a client and a server such as SSL, TLS, SSH are asymmetric in the sense that the querying client and the responding server play different roles, and for which there is a need for two-way linkability between queries and responses within the protocol. We are motivated by the observation that though results exist in other related contexts, no provably secure ...

متن کامل

Protocol Portability through Module Encapsulation

Because protocol software is difficult and expensive to implement and test, it is often ported between systems, instead of being rewritten from scratch. Unfortunately, porting protocol software can be nearly as difficult as from-scratch development, due to inherent differences in subsystem design and services provided. Thus, protocol subsystems can have a profound effect on the portability of a...

متن کامل

IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification

Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is u...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: PLOS ONE

سال: 2019

ISSN: 1932-6203

DOI: 10.1371/journal.pone.0218045